Just Security - Online forum for the analysis of U.S. national security law and policy.
Kosovo Force (KFOR) - A NATO-led international force responsible for establishing and maintaining security in Kosovo. This peace-enforcement force entered Kosovo on 12 June 1999 under a United Nations mandate, two days after the adoption of UN Security Council Resolution 1244.
L3 Communications - A leading provider of Intelligence, Surveillance and Reconnaissance (ISR) systems, secure communications systems, aircraft modernization, training and government services. The company is a leading merchant supplier of a broad array of high technology products, including guidance and navigation, sensors, scanners, fuzes, data links, propulsion systems, simulators, avionics, electro optics, satellite communications, electrical power equipment, encryption, signal intelligence, antennas and microwave components. L-3 also supports a variety of Homeland Security initiatives with products and services. Its customers include the Department of Defense, Department of Homeland Security, selected U.S. government intelligence agencies and aerospace prime contractors.
La Quadrature du Net - An advocacy group defending the rights and freedoms of citizens on the Internet. More specifically, it advocates for the adaptation of French and European legislations to respect the founding principles of the Internet, most notably the free circulation of knowledge. As such, La Quadrature du Net engages in public-policy debates concerning, for instance, freedom of expression, copyright, regulation of telecommunications and online privacy.
Lawfare - Law and national security issues. Founded by Benjamin Wittes, Jack Goldsmith, and Robert Chesney, whose writings cover the nebulous zone in which actions taken or contemplated to protect the nation interact with the nation's laws and legal institutions.
Literature of Intelligence - The beginning point for using The Literature of Intelligence: A Bibliography of Materials, with Essays, Reviews, and Comments, by J. Ransom Clark, J.D. Most major, many minor, and some obscure books dealing in some fashion with intelligence matters are listed. As often as possible, these are accompanied by comments or reviews from Clark, Alec Chambers, published reviews, bibliographers, authors who have chosen to comment on other writers' works, or some other source. Almost every article published in both of the academically oriented intelligence journals, Intelligence and National Security and International Journal of Intelligence and Counterintelligence, is at least listed, and many of these listings include substantive or other comments based on my or someone else's reading of the article. The primary and other sources of both materials and comments are detailed in separate files: Major Sources and Other Sources.
Lux Ex Umbra - Bill Robinson's blog, monitoring Canadian signals intelligence (SIGINT) activities past and present.
MI5 - United Kingdom's security intelligence agency.
MKULTRA - Code name for a CIAmind control research program lasting from the 1950s through the 1970s. Starting from 1964, the project was renamed to MKSEARCH. The project's goal was to produce a perfect truth drug for use in interrogating suspected Soviet spies during the Cold War, and generally to explore any other possibilities of mind control. Experiments were often conducted without the subjects' knowledge or consent. The project was headed by Dr. Sidney Gottlieb.
Mossad - FAS backgrounder on the Israeli intelligence agency. Mossad [Hebrew for 'institute'] has responsibility for human intelligence collection, covert action, and counterterrorism. Its focus is on Arab nations and organizations throughout the world. Mossad also is responsible for the clandestine movement of Jewish refugees out of Syria, Iran, and Ethiopia. Mossad agents are active in the former communist countries, in the West, and at the UN.
Munich Security Conference (MSC) - Over the past four decades the Munich Security Conference has become the most important independent forum for the exchange of views by international security policy decision-makers. Each year it brings together about 350 senior figures from more than 70 countries around the world to engage in an intensive debate on current and future security challenges. See Wikipedia entry.
NameBase Book Index - Extensive bibliographical resources: Academia, Assassinations, Big Business, Cults, Drugs, Elites, High Tech, Intelligence, Media, Military, Nazis, Organized Crime, Repression, Scandals, Terrorism, UFOs, U.S. Foreign Policy, Vietnam War.
Narus - An independent subsidiary of The Boeing Company and pioneer in cybersecurity and machine intelligence. Capable of network traffic intelligence system that supports real-time precision targeting, capturing and reconstruction of webmail traffic, including Google Gmail, MSN Hotmail and Yahoo! Mail. However, currently most webmail traffic can be HTTPS encrypted, so the content of messages can only be monitored with the consent of service providers. Narus counts governments, carriers and enterprises around the world among its growing customer base.
National Geospatial-Intelligence Agency (NGA) - Provides geospatial intelligence in all its forms, and from whatever source--imagery, imagery intelligence, and geospatial data and information--to ensure the knowledge foundation for planning, decision, and action.
National Intelligence Council (NIC) - The Intelligence Community's (IC's) center for strategic thinking. The NIC is best known as the organization that produces National Intelligence Estimates, which are intelligence community-wide forecasts of issues and challenges facing the security of the United States. Also see:
National Reconnaissance Office (NRO) - Designs, builds and operates the nation's reconnaissance satellites. NRO products, provided to an expanding list of customers like the Central Intelligence Agency (CIA) and the Department of Defense (DoD), can warn of potential trouble spots around the world, help plan military operations, and monitor the environment.
National Reconnaissance Office (NRO) Declassified - In September 1992 the Department of Defense acknowledged the existence of the National Reconnaissance Office (NRO), an agency established in 1961 to manage the development and operation of the nation's reconnaissance satellite systems. Overview of the NRO and declassified documents relating to its role.
National Security Agency (NSA) - Coordinates, directs, and performs highly specialized activities to protect U.S. information systems and produce foreign intelligence information. It is also one of the most important centers of foreign language analysis and research within the Government. Also see:
Charts tracking release of NSA docs by Edward Snowden and others since June 2013:
National Security Agency / Central Security Service - America's cryptologic organization. It "coordinates, directs, and performs highly specialized activities to protect U.S. government information systems and produce foreign signals intelligence information."
NSA-o-Matic - Learn about NSA's spin, questionable assertions, and outright lies.
Spies Without Borders; Using Domestic Networks to Spy on the World - A series of articles looking into how the information disclosed in the NSA leaks affect the international community and how they highlight one part of an international system of surveillance that dissolves what national privacy protections any of us have, whereever we live. Published jointly by EFF and CIPPIC.
Intelligence Authorization Act - The American Constitution states, in Article 1, Section 9, that "a regular Statement and Account of the Receipts and Expenditures of all public Money shall be published from time to time." The Intelligence Authorization Act was passed along with the Intelligence Oversight Act of 1980 that allowed Congress and members of the agency to be included in important decisions and operations carried out by the Central Intelligence Agency. The Intelligence Authorization Act was also an attempt to limit the authority and secrecy within the CIA regarding foreign and domestic affairs. Also see various Intelligence Authorization Acts passed since 1979.
National Security Archive - The Archive is simultaneously a research institute on international affairs, a library and archive of declassified U.S. documents obtained through the Freedom of Information Act, a public interest law firm defending and expanding public access to government information through the FOIA, and an indexer and publisher of the documents in books, microfiche, and electronic formats. Also see Electronic Briefing Books page.
National Security Counselors (NSC) - Exists to perform four primary functions: to lawfully acquire from the government material related to national security matters and distribute it to the public, to use this material in the creation of original publications discussing the respective subjects, to advocate for intelligent reform in the national security and information and privacy arenas, and to provide a low-cost alternative to certain deserving clients involved in security law or information and privacy law-related proceedings.
National Security Decision Directives (NSDD) [Reagan Administration] - NSDD were issued by President Ronald Reagan and his Assistants to the President for National Security Affairs to set forth official national security policy for the guidance of the defense, intelligence, and foreign policy establishments of the United States Government.
National Security Law, Fifth Edition - By Stephen Dycus, Arthur L. Berney, William C. Banks, Peter Raven-Hansen. Provides the broadest exploration of both constitutional and domestic law issues in national security of any book in the field. This book has been adopted for classroom use at a majority of American law schools, as well as military academies and schools, and non-law graduate programs.
National Security Letter - A form of administrative subpoena used by the U.S Federal Bureau of Investigation. It is a demand letter issued to a particular entity or organization to turn over various record and data pertaining to individuals. They require no probable cause or judicial oversight. They also contain a gag order, preventing the recipient of the letter from disclosing that the letter was ever issued.
National Security Letters: FAQ - Overview from Electronic Frontier Foundation. A national security letter (NSL) is a law enforcement investigative tool similar to a subpoena and is most commonly issued by the FBI. NSLs are used to obtain information from companies as part of national security-related investigations. They allow the FBI, and in limited circumstances other federal agencies, to demand that companies turn over data about their customers' use of services such as banking, telephone, and Internet usage records.
National Security News Service: DC Bureau - Public Education Center (PEC) investigative journalism. Award-winning investigative reporters whose mission is to investigate previously overlooked news stories about significant issues-chief among them the environment and national security.
National Security Whistleblowers Coalition (NSWBC) - An independent and nonpartisan alliance of whistleblowers who have come forward to address our nation's security weaknesses; to inform authorities of security vulnerabilities in our intelligence agencies, at nuclear power plants and weapon facilities, in airports, and at our nation's borders and ports; to uncover government waste, fraud, abuse, and in some cases criminal conduct.
Naval Criminal Investigative Service (NCIS) - NCIS is the primary law enforcement and counterintelligence arm of the United States Department of the Navy. It works closely with other local, state, federal, and foreign agencies to counter and investigate the most serious crimes: terrorism, espionage, computer intrusion, homicide, rape, child abuse, arson, procurement fraud, and more.
NSA Spying on Americans - The US government, with assistance from major telecommunications carriers including AT&T, has engaged in a massive illegal dragnet surveillance of domestic communications and communications records of millions of ordinary Americans since at least 2001. Since this was first reported by the press and discovered by the public in late 2005, EFF has been at the forefront of the effort to stop it.
Those efforts, history, blog posts, case documents and more may be found here. Also see:
Office of the Director of National Intelligence - The U.S. Intelligence Community is a coalition of 17 agencies and organizations, including the ODNI, within the Executive Branch that work both independently and collaboratively to gather and analyze the intelligence necessary to conduct foreign relations and national security activities. Descriptions and links to members of the U.S.Intelligence Community:
Office of the National Counterintelligence Executive (ONCIX) - Part of the Office of the Director of National Intelligence and is staffed by senior counterintelligence (CI) and other specialists from across the national intelligence and security communities. The ONCIX develops, coordinates, and produces foreign intelligence threat assessments and other analytic CI products.
QinetiQ - A leading international defence and security company providing technology-based solutions and products and technology-rich support services for major government organisations, such as the UK MOD and the US DoD, and for commercial customers around the world. Also see QinetiQ North America.
Operation Northwoods - Code name for a U.S. Department of Defense draft memorandum outlining potential false flag actions, under the Cuban flag. The draft memorandum was written in 1962 by the Department of Defense and Joint Chiefs of Staff (JCS) representative to the Caribbean Survey Group and presented to Secretary of Defense Robert McNamara by the JCS on March 13, 1962, with one paragraph approved, as a preliminary submission for planning purposes. The proposal was rejected by McNamara. Often claimed to be an unfounded conspiracy theory, the document was declassified in recent years by the Freedom of Information Act, thereby proving to be a verified conspiracy.
Organization for Security and Co-operation in Europe (OSCE) - The largest regional security organization in the world with 55 participating States from Europe, Central Asia and North America. It is active in early warning, conflict prevention, crisis management and post-conflict rehabilitation. The Organization employs about 3,000 staff in 18 missions and field activities located in South-eastern Europe, the Caucasus, Eastern Europe and Central Asia. They work 'on the ground' to facilitate political processes, prevent or settle conflicts, and promote civil society and the rule of law.
Original Wizards of Langley - This overview and collection of documents and other material related to the Office of Scientific Intelligence (OSI) offer a glimpse of CIA's overall contribution to the analysis of Soviet capabilities in science and technology during the Cold War. It is not definitive, or even complete. It does, however, highlight some key events and selected activities that contribute to our understanding of the role OSI played in the Agency's history.
Oversea's Security Advisory Council (OSAC) - Established in 1985 by the U.S. Department of State to foster the exchange of security related information between the U.S. Government and American private sector operating abroad. Administered by the Bureau of Diplomatic Security, OSAC has developed into an enormously successful joint venture for effective security cooperation. Through OSAC, the American private sector, including colleges and universities, is provided timely information on which to make informed corporate decisions on how best to protect their investment, facilities, personnel and intellectual property abroad.
Oxford Research Group (ORG) - Combines research into nuclear disarmament and non-proliferation, UK security policy, and global security in the changing international environment, with an understanding of the people who make those decisions. Our areas of research include: preventing the further spread of nuclear weapons; control of the arms trade; constructive approaches to dealing with international terrorism and the 'war on terror'; and effective non-violent approaches to conflict prevention and resolution.
Pentagon's Spies, The - The documents that make up this briefing book provide a window into the creation, evolution and (in some cases) abolition of a number of military service/DoD human intelligence organizations, the product of their activities, and the controversies that have occurred over the last several decades.
Pine Gap, Australia - Pine Gap, near Alice Springs, , Northern Territory in the centre of Australia, employs nearly 1,000 people, mainly from the Central Intelligence Agency and the National Reconnaissance Office. Originally code-named MERINO, it is the ground station for a satellite network that intercepts telephone, radio, data links, and other communications around the world. The facility currently includes a dozen radomes, a 5,600 square meter computer room, and 20-odd service and support buildings. Two of its ground antenna are part of the U.S. Defense Satellite Communications System. The station is a key contributor to the global surveillance network ECHELON. Also see Strategic US Military Intel Base in Pine Gap, Australia and Wikipedia article.
President's Foreign Intelligence Advisory Board (PFIAB) - Provides advice to the President concerning the quality and adequacy of intelligence collection, of analysis and estimates, of counterintelligence, and of other intelligence activities. The PFIAB, through its Intelligence Oversight Board, also advises the President on the legality of foreign intelligence activities.
Princeton Collection, The - Analytic reports produced by the Directorate of Intelligence on the former Soviet Union declassified and released for a March 2001 conference at Princeton University.
Prisoner Abuse: Patterns From the Past - National Security Archive Electronic Briefing Book No. 122 provides DOD and CIA interrogation manuals, reports and memorandums written in the 1960s and 1980s describing interrogation coercive techniques.
Public Interest Declassification Board - An advisory committee established by Congress in order to promote the fullest possible public access to a thorough, accurate, and reliable documentary record of significant U.S. national security decisions and activities.
Public Interest Report (FAS) - The Federation of American Scientists publishes the Public Interest Report bi-monthly. The journal covers the FAS's various projects such as Arms Sales Monitoring, Biological Weapons, CyberStrategy, Intelligence Reform, Military Analysis, Monitoring Emerging Diseases, Nuclear Weapons, Secrecy and Government, and Space Policy, as well as current affairs.
RAND National Security Research and Analysis - RAND conducts a broad array of research on national security issues for divisions of the U.S. defense establishment - including the Air Force, Army, Office of the Secretary of Defense, Joint Staff, Unified Commands, defense agencies, and intelligence community - and for key allied governments.
Recorded Future - The world's 24x7 media flow constantly talk about time, whether it is reports of what's transpired or statements of what's expected to come. Recorded Future's linguistics and statistics algorithms extract time-related information and through temporal reasoning helps users understand relationships between entities and events over time, to form the world's first temporal analytics engine. The investment arms of the CIA and Google are both backing this company which monitors the web in real time - and says it uses this information to predict the future. Recorded Future scours tens of thousands of websites, blogs and Twitter accounts to find the relationships between people, organizations, actions and incidents - both present and still-to-come. Also see related Recorded Future, Predictive Signals, and Analysis Intelligence blogs.
Rendition Project, The - Analyses the emergence, development and operation of the global system of rendition and secret detention in the years since 9/11. In doing so, it aims to bring together as much of the publicly-available information as possible on the detainees who have been held in secret, the detention sites in which they have been held, and the methods and timings of their transfers. Also see Rendition Flights Database.
Richard Helms Collection - This is a collection of material by and about Richard Helms as Director of Central Intelligence (DCI) and Ambassador to Iran. The documents, historical works and essays offer an unprecedented, wide-ranging look at the man and his career as the United States' top intelligence official and one of its most important diplomats during a crucial decade of the Cold War. From mid-1966, when he became DCI, to late 1976, when he left Iran, Helms dealt directly with numerous events whose impact remains evident today and which are covered in the release.
Royal Commission on Intelligence and Security (RCIS) - Initiated a comprehensive inquiry into Australia's security services, including their history, administrative structure and functions. The RCIS was established on 21 August 1974 and concluded its work in 1977. On 27 May 2008, Australia's National Archives released the records of the RCIS for public access.
Secrecy News - Steven Aftergood's coverage of new developments in secrecy, security and intelligence policies.
Secret No More - Blog by national security critic William M. Arkin. Writes about the defense budget, government secrecy, the 'war' on terrorism, homeland security, and the root of all evil: Washington.
Secret Team, The - The CIA and Its Allies in Control of the United States and the World - Written by Col. L. Fletcher Prouty: "It is time to face the fact that true national sovereignty no longer exists. We live in a world of big business, big lawyers, big bankers, even bigger money-men and big politicians. It is the world of "The Secret Team" and its masters. We are now, despite common mythology to the contrary, the most dependent society that has ever lived, and the future of the viability of that infrastructure of that society is unpredictable. It is crumbling."
Secret Wars of the CIA (John Stockwell) - John Stockwell is the highest-ranking CIA official ever to leave the agency and go public. He ran a CIA intelligence-gathering post in Vietnam, was the task-force commander of the CIA's secret war in Angola in 1975 and 1976, and was awarded the Medal of Merit before he resigned. This is a transcript of a lecture Stockwell gave in June, 1986.
Secure Border Initiative (SBI) - Launched in November 2005, the SBI is a comprehensive multi-year plan established by the Department of Homeland Security (DHS) to secure America's borders and reduce illegal cross-border activity. SBI - which focuses on effective integration of border security programs - aims to gain effective control of our Nation's borders through substantial investments in technology, infrastructure, and enforcement personnel. See GAO search.
SIDtoday Files - SIDtoday is the internal newsletter for the NSA's most important division, the Signals Intelligence Directorate. After editorial review, The Intercept is releasing nine years' worth of newsletters in batches, starting with 2003. The agency's spies explain a surprising amount about what they were doing, how they were doing it, and why.
Signals Intelligence - From Wikipedia: Intelligence-gathering by interception of signals, whether between people ("communications intelligence"-COMINT) or from electronic signals not directly used in communication ("electronic intelligence"-ELINT), or a combination of the two. As sensitive information is often encrypted, signals intelligence often involves the use of cryptanalysis. Also, traffic analysis-the study of who is signaling whom and in what quantity-can often produce valuable information, even when the messages themselves cannot be decrypted.
Special Operations - A wide-ranging gathering of Special Operations/Low Intensity Conflict (SO/LIC) related topics.
SpyTalk - Jeff Stein's blog specializing in U.S. intelligence, defense and foreign policy.
Stimson - A nonproﬁt think tank that finds pragmatic solutions to global security challenges. It develops approaches to non-conventional challenges such as water management, wildlife poaching and responses to humanitarian crises. At the same time, Stimson plays a key role in debates on nuclear proliferation, arms trafficking and defense policy.
Sustainable Security - Refers to a sustainable approach to global security, emphasising the long-term resolution of the root causes of insecurity and conflict.
Synthetic Aperture Radar (SAR) - Applications for synthetic aperture radar includes reconnaissance, surveillance, and targeting. These applications are driven by the military's need for all-weather, day-and-night imaging sensors. SAR provides sufficiently high resolution to distinguish terrain features and to recognize and identify selected man made targets. Other applications include: treaty verification and nonprolliferation compliance, interferometry, navigation and guidance, foliage and ground penetration, moving target indication, change detection, and environmental monitoring.
TALON - SourceWatch backgrounder: The acronym for Threat and Local Observation Notice.To track domestic terrorist threats against the military, the Pentagon is creating a new database that will contain 'raw, non-validated' reports of 'anomalous activities' within the United States," Brian McWilliams reported June 25, 2003, in Wired News.According to a Department of Defense memorandum, the system, known as Talon, will provide a mechanism to collect and rapidly share reports 'by concerned citizens and military members regarding suspicious incidents.' "
Terminal Air - A visualization system developed for mapping the movements of planes over time. The flights represented here are ones known or suspected to have been involved in the CIA extraordinary rendition program. The extraordinary rendition program involves the kidnapping and transport of suspect terrorists to undocumented prisons where they can be held, interrogated and tortured outside the research of international scrutiny.
Terrorism Information Awareness Program - U.S. Department of Defense Advanced Research Projects Agency massive program of public surveillance. The Information Awareness Office (IAO) was established by the Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to national security, by achieving Total Information Awareness (TIA). This would be achieved by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social networks, credit card records, phone calls, medical records, and numerous other sources including, without any requirement for a search warrant. This information would then be analyzed to look for suspicious activities, connections between individuals, and "threats". Additionally, the program included funding for biometric surveillance technologies that could identify and track individuals using surveillance cameras, and other methods. Following public criticism that the development and deployment of these technologies could potentially lead to a mass surveillance system, the IAO was defunded by Congress in 2003. However, several IAO projects continued to be funded, and merely run under different names. See Wikipedia.
Terrorism Research Center (TRC) - TRC is an independent institute dedicated to the research of terrorism, information warfare, critical infrastructure protection and other issues of low-intensity political violence and gray-area phenomena. This site features essays and thought pieces on current issues, as well as links to other terrorism documents, research and resources.
Top Secret America - Washington Post reporters Dana Priest and William M. Arkin spent two years investigating the government's response to 9/11. Top Secret America explores what they found. More than 20 journalists worked on the investigation, including investigative reporters, cartography experts, database reporters, video journalists, researchers, interactive graphic designers, digital designers, graphic designers, and graphics editors. Also see Top Secret America: Voices.
Triple Canopy - Founded in September 2003 by Thomas Katis, Matthew Mann and John Peters. By 2005 they had accumulated over $90 million in government contracts. Early in 2004, Triple Canopywon government contracts to guard 13 Coalition Provisional Authority headquarters throughout Iraq. Triple Canopy now has about 1,000 men in Iraq, about 200 of them American and almost all the rest from Chile and Fiji. Its rivals include British firms that draw from the elite units of the U.K. military and outfits that draw from South African veterans of the wars to save apartheid. Australians and Ukrainians and Romanians and Iraqis are all making their livings in the business. Many have experience as soldiers; some have been in law enforcement. The firms guard the huge American corporations struggling to carry out Iraq's reconstruction. The private gunmen try to hold the insurgents at bay so that supplies can be delivered and power stations can be built. And companies like Triple Canopy shield American government compounds from attack. With guns poking out from sport utility vehicles, they usher American officials from meeting to meeting. They defend the buildings and people whom the insurgency would most like to reach." See SourceWatch entry on Triple Canopy.
U.S. Air Force Office of Special Investigations (OSI) - The Air Force's major investigative service since 1948. The agency reports to the Inspector General, Office of the Secretary of the Air Force. Its primary responsibilities are criminal investigations and counterintelligence services.
U.S. Army Criminal Investigation Command (CID) - CID collects, analyzes, processes and disseminates criminal intelligence; conducts protective service operations; provides forensic laboratory support to all DoD investigative agencies, and maintains Army criminal records. CID also provides criminal investigative support to all U.S. Army elements and deploys on short notice in support of contingency operations worldwide.
U.S. Coast Guard Office of Law Enforcement - The specific statutory authority for the Coast Guard law enforcement mission is given in 14 USC 2, "The Coast Guard shall enforce or assist in the enforcement of all applicable laws on, under and over the high seas and waters subject to the jurisdiction of the United States." In addition, 14 USC 89 provides the authority for U.S. Coast Guard active duty commissioned, warrant and petty officers to enforce applicable U.S. law. It authorizes Coast Guard personnel to enforce federal law on waters subject to U.S. jurisdiction and in international waters, as well as on all vessels subject to U.S. jurisdiction (including U.S., foreign and stateless vessels).
U.S. Intelligence Community - The U.S. Intelligence Community refers collectively to those Executive Branch agencies and organizations that conduct the varied intelligence activities which make up the total U.S. national intelligence effort. Members of Intelligence Community:
U.S. v. Reynolds (1953) - In 1953, the U.S. Supreme Court decision in U.S. v. Reynolds asserted the state secrets privilege. For more than fifty years, the state secrets privilege has enabled the military and its commander in chief to exempt themselves from the scrutiny of the democratic society their duty it is to protect. It's one of the things that has helped the military-industrial complex to grow its way into US society to such an extent that, today, anti-militarism has come to seem anti-American to most of our fellow citizens.
Using Our Intelligence - Former with MI5, Annie Machon is blogging on security and intelligence, ethics and citizenship, the war on terror, the war on drugs, press and media freedoms, secrecy legislation, civil liberties, totaitarianism and police states, accountability in government and business.
USA Freedom Act - Wikipedia backgrounder. A bill concerning the Federal Government's authority to require the production of certain business records, conduct electronic surveillance, use pen registers and trap and trace devices, and use other forms of information gathering for foreign intelligence, counterterrorism, and criminal purposes, and for other purposes.
USA Patriot Act
USA PATRIOT Act - Full text, summary, backgrounder and additional resources. Many parts of this sweeping U.S. legislation take away checks on law enforcement and threaten citizen rights and freedoms. For example, without a warrant and without probable cause, the FBI now has the power to access your most private medical records, your library records, and your student records, and can prevent anyone from telling you it was done.
USA Patriot Act - Wikipedia backgrounder. Full text of this legislation to ostensibly "deter and punish terrorist acts in the United States and around the world, to enhance law enforcement investigatory tools, and for other purposes." Also see:
USIS - Specializes in providing information and security services to government agencies and commercial enterprises. Headquartered in Falls Church, Virginia, USIS delivers background screening and risk management solutions.
Venona Project - The Venona project was a long-running secret collaboration of the United States and United Kingdom intelligence agencies involving cryptanalysis of messages sent by intelligence agencies of the Soviet Union, the majority during World War II.
Verint - Verint Systems keeps a close eye on all sorts of data. Formerly Comverse Infosys, the company provides analytic software for communications interception, video surveillance, and business intelligence. Its STAR-GATE software allows communications service providers to capture voice, fax, video, and e-mail transmissions, while its RELIANT software (sold to law enforcement and government agencies) is used for intercepting, processing, and analyzing data. Verint offers business intelligence software to improve call center efficiency by recording and analyzing the actions of call center agents, as well as video surveillance systems. Comverse Technology owns about 60% of the company. Verint Communications Interception Solutions help government and law enforcement agencies neutralize threats from terrorists and criminals who exploit today's communications networks. Verint Communications Interception Solutions help extract the most important information from voice and data collected over virtually any type of network. This actionable intelligence helps organizations rapidly detect and address security threats and build evidence for legal prosecution. Verint offers a comprehensive, integrated portfolio of interception, monitoring, and analytic solutions. Our solutions are ETSI and CALEA compliant and work with virtually any type of network, content, application, or service. And our worldwide presence positions us to address new challenges and technologies as they emerge, providing our customers with solutions that help them achieve their objectives. Communications service providers, law enforcement, and government agencies worldwide rely on Verint to help deter terrorism, prevent crime, and protect lives and assets.
Veterans Today (VT) - Provides news for members of the military and veteran community in areas of national security, geopolitical stability and domestic policy.
Voices Magazine - Geopolitics, security, intelligence, and military affairs.
Western Hemisphere Institute for Security Cooperation (WHISC) - "Provides professional education and training to military, law enforcement, and civilians to support the democratic principles of the Western Hemisphere." See School of the Americas Watch for the real story: Based in Fort Benning, Georgia, the WHISC [formerly called the U.S. Army School of Americas (SOA)] trains Latin American soldiers in combat, counter-insurgency, and counter-narcotics. Graduates of the SOA are responsible for some of the worst human rights abuses in Latin America. Among the SOA's nearly 60,000 graduates are notorious dictators Manuel Noriega and Omar Torrijos of Panama, Leopoldo Galtieri and Roberto Viola of Argentina, Juan Velasco Alvarado of Peru, Guillermo Rodriguez of Ecuador, and Hugo Banzer Suarez of Bolivia. Lower-level SOA graduates have participated in human rights abuses that include the assassination of Archbishop Oscar Romero and the El Mozote Massacre of 900 civilians. Also see Grads in the News.
World Security Network (WSN) - German entrepreneur and geostrategist Dr. Hubertus Hoffmann is Founder and President of this global foreign affairs action network. 303,000 members of the international information elite -including more than 125,000 members of foreign affairs networks, 65,000 business executives and lawyers, 40,000 professors and students of elite universities, 32,000 journalists, 19,000 foreign and defense specialists, 6,000 religious leaders and more than 3,000 members and staff of parliaments - receive our weekly electronic newsletter. This makes it the largest of its kind worldwide.
KWSnet is an Internet subject directory providing special attention to U.S. national and international news, the arts, computing, culture, environment, law, literature, media, politics, science and technology. Based in San Francisco, California, KWSnet contains over 150,000 annotated links to resources worldwide. Use Search KWSnet, located at the top of each page, to search within this site. Use Ctrl-F (Windows) or ⌘-F (Mac) to search within individual pages.